Analysis

  • max time kernel
    145s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 23:38

General

  • Target

    i.msi

  • Size

    28.2MB

  • MD5

    adad9dc1c3a779bc9f189dcaad4f3736

  • SHA1

    09b4530a586478183a6ec47bf931593ac6368777

  • SHA256

    be2f50d49e8eb863aa3e4aa47c414beffdd6b126837dadf40483de0f2ef254d8

  • SHA512

    8b077ae6512e2edf8d957cfb807a24e0038560d997862f65ed5ccd6998ac58ab4c943c8af42d1b166edce8523223786136ba80f2e6c3221e4274406e3dae1120

  • SSDEEP

    786432:fmjD4lNUa68C1NpRojPmJsUQOIe/oyUFvpOBsB0Qe:fLHUrR1NpRozmJsUue/TUbe

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\i.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4496
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4992
      • C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe
        "C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4448
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x50c 0x524
      1⤵
        PID:1452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e604ccd.rbs

        Filesize

        10KB

        MD5

        b8061c5895fcd58f0ed34af4480f492b

        SHA1

        ae7692a089f520ef7feed4ea41d053ddc0112150

        SHA256

        d34152908d9c82dcbb9b717483f1b37dc4b226008995f8ed5a73120b9a68d179

        SHA512

        5ea57191524964bcff50f96ba20049eade14048468d2500e47cbf1924db7e63e9384d699ee138689702a08b2aecf3f06b861a0ba2f7844551875176db78c520a

      • C:\Users\Admin\AppData\Local\3delite\Professional Tag Editor\ProfessionalTagEditor.ini

        Filesize

        1KB

        MD5

        3ce0552fd9437a5da1beb41815025171

        SHA1

        7896c203c7a4e06a542f62845f73cb650d503112

        SHA256

        81a5d4edb95256a1b461f5aff923bf71c5e5594c654c16842b99b131c5fd1d71

        SHA512

        97eba768bc88a731528aa6c8dddd08ce3447deafb1bc4a104a01502b5d47346a5c72edcd0f09f21fc2fb51b12774c94992103dbe11ea99cd5bdcb9da9195277e

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\Chat.dat

        Filesize

        5.5MB

        MD5

        8bec073b4d2f5effa52cf23e3d2c86d6

        SHA1

        ab925f7f897081bfb26624c6acb27576ebbcad97

        SHA256

        dcee10beff739d5deb28383a14b339546031c233ac1d1cb93e45b3286e2b6b87

        SHA512

        38dbc1a0a783527c077f0547c6d71d3e32a345f660312021a7f3c0ef8d65a7828148f849cf152c04e6d076755c435aa4546bd6a8863315694b96a2e42a8df717

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\FastMM_FullDebugMode.dll

        Filesize

        384KB

        MD5

        38935fc9c5be7e926638b1b246dc490e

        SHA1

        0caa8c04dcd848195e059719deef283cdfb16255

        SHA256

        29f505e5dedf9b44664313964cf78f2af2287e941349ff7373cd4d3faaefcdfe

        SHA512

        7c57741a818105ef932fe66ce1f7892e30f2ef761330f512530cf829d6af2841852ae5624b9fc86ea209fd59791e8eac90d829a6ea1bfd056a91d50b086e69ef

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\FilesystemDialogs.dll

        Filesize

        15.4MB

        MD5

        757e61e2ffc68b1040659dd0517a469f

        SHA1

        ca4b763379383b5a11332ef82cbe84a2ef7b9e4b

        SHA256

        47fb445f40b042aa4c41ed423da92e9e8b99156918564e08e57716eb6f6e8979

        SHA512

        f5118e184fc7d302b5b8e0d0659b6b208cadcce716f52d734abef6da3be12672b679f81898ac66d82755ee8257156bc941bfed068f690017590574924d3fac83

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\FreeImage.dll

        Filesize

        5.7MB

        MD5

        33082bf128b1700be41bbc0377520abb

        SHA1

        b8aa3500d08ed31cdb13313311496e6e706967f3

        SHA256

        f5914cf345f20177203e72987eca4a442ddd50934eb6273aa433c177e9640a41

        SHA512

        f513af6cdc480a4e0963976618ffa95763960311e257478fcb06b0210ab12704e53d5bccdf1d9331481acc10b819661c5c36df62d69610aa206678da302a5251

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\MediaInfo.dll

        Filesize

        4.8MB

        MD5

        68d314050a796563ddcd7302ce0f25d2

        SHA1

        25e2e5471667166f8ad319c80a92463d728f8f94

        SHA256

        98d0ab5ede77ffe0f51e02f5380d487a791f601563e9d67c86a37b5bd4c7ecf8

        SHA512

        9e1a03132479e7e7b7ccd34f9c9bfed32be51370b0625d84f081649875580039a1dd75352827f6442cc7d0dbd5f855bf51cd92ff4e133bb5672695b6394c3848

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe

        Filesize

        15.1MB

        MD5

        5da6728795945b0e1d5f56c192feda83

        SHA1

        2ec63eace161477c839a36df60b62e8493021341

        SHA256

        a40cbbefc592d053086a56b39a26b803159acded807c82bc7ec195565ef8402e

        SHA512

        7af07da57805a3d0479b2e9873ef9cb510468292f4cfe3f645d1e3a7c580b21e8e2b95bc0ae0e4d63bdd49bb2b2bd2bcae3022059f021b704eb8050c3d0674cc

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\ReliefJet.Engine.dll

        Filesize

        973KB

        MD5

        995e1e82bc28ea6f74de610e68288df3

        SHA1

        8f489198119d96aab181d85744bc63b86226816c

        SHA256

        4ae3f2719338cdaf74062182d7faf15b8525a01fa213152d7049af4cdf1464d1

        SHA512

        6eae739bcb779ee315a533bb18e8b7988be56415f823b79b0d3c818ac0ac0d1bdffa8368b00bb5f02719d3cfc12ca71be442f5dbbe2fb6e73675d9d23ebeb874

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\bass.dll

        Filesize

        126KB

        MD5

        f2a113b6ee24d9382953c9729ae357af

        SHA1

        749f4512a02287095a53db634783f7e399cd31b9

        SHA256

        0738dc614d751b3b08125c03a920fc243a3e5eea4f16d3374d8d94a6e2454477

        SHA512

        f9f366515b337c9df48ff1a21fb124091b2bec94c8a2d94de9c17c210b24931222a11d5b9914ea2fa40807ff7d4322d72d7779f34d07ce3ca2a44795718d047b

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\libeay32.dll

        Filesize

        1.3MB

        MD5

        c99622fa718ca4c7212d83deec3f8fcc

        SHA1

        b09bbc7f5f010ab1d750b5290cf331b372cd7fae

        SHA256

        b3c8ebdefa0ac64ef123b360627001322af4e21e97e20df86ea16168877e5119

        SHA512

        3a2d0f9c35f019eebe25c7c4507c8c3764abbefab414555f111b08842cd6dc034cd2437d39d58620ce2c18ab0124317c552d1146beebc7e8f68465670d1d55fd

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\license.txt

        Filesize

        10KB

        MD5

        2c64beb8d1808a70ccf9f4f5cc06551d

        SHA1

        a51ba1892bfb3f61961bc52868fb4ed4ff88cd1f

        SHA256

        6d8de76e9f8b7b92334fb01338b203c7933fac24941ff9b3d5d027af7b0b2a07

        SHA512

        511a82c8e9ee4fed41a19593e838690ab31cd52d033966d5f707b5e0eaebb4d6b62d3ae448231c70597673d38d2fe0baaa25ad284a9b2982109d32da366b09e9

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\model1.1.dll

        Filesize

        10.1MB

        MD5

        235f1638a95f769d22a2c9ef30a79537

        SHA1

        177f8cde7873b70d212d9f7a9c330f7ebcab3125

        SHA256

        a0b49a4855720341f9fce6ee0457a710159423a6ba2dde1ca48fa43a270498fb

        SHA512

        9ce6dc84b03ffd3084bba1ece999ba2be5b3c50d853b22e6933f1e4651274841a422da8fb99be5dc5e9f6f24b1d69c5839b1c17dc250546ea6ed66c56fc43290

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\specification.wav

        Filesize

        4.0MB

        MD5

        60c3da024900a4255403a2d497e03067

        SHA1

        2c20e909253f8cad399d42e510189709aa84d7f9

        SHA256

        b75e499f4472d4b77004b8ec2a37c4ccc91ddd39b78279b519afc0451b4a28ba

        SHA512

        31935f7b59e921542a7c65e4f64fcc1f5ae2616a9dd894910d012c88ac834c8c0cd193c4112a8648ec52d835b892489f9d6ead08105b1eaf009cd5ba0d91bc0d

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\ssleay32.dll

        Filesize

        330KB

        MD5

        16b5d4d7641cddfc28748f48ae46ae4b

        SHA1

        9b4b30d36e816212da72313854dbabde80d2034a

        SHA256

        f82e938935108f9ed8411f8b567a618e24a0e25c63e36435538f3ac4f49822dc

        SHA512

        88c0e07ae26bf7d2e5fc1671cd37180089709416064b488d68e1700b9f5e2c7472a368baf96a60f369373612ca9d1d503b8d0a5ffe050862f306d8174a1ef7ef

      • C:\Users\Admin\AppData\Local\Programs\VDownloader\ssleay32.dll

        Filesize

        330KB

        MD5

        e2616501d38321dffe061456ea53899b

        SHA1

        8c67ab03d4c19c3ed25b0cb73bff47e953f10050

        SHA256

        bb8ee38e365913af381b5911bcb2d9722177dc9de5dd311c17b020c16dd6bec0

        SHA512

        81aa45ae5ad68cab7994ca6d9fa2a2244f9865a3cd7dc3e37b0d18c18cdc0c453d65ba48b807f6f2a82ff7a9ea71fcdf48964831c6dc46545bdc02fc4dc7d343

      • C:\Windows\Installer\e604ccc.msi

        Filesize

        28.2MB

        MD5

        adad9dc1c3a779bc9f189dcaad4f3736

        SHA1

        09b4530a586478183a6ec47bf931593ac6368777

        SHA256

        be2f50d49e8eb863aa3e4aa47c414beffdd6b126837dadf40483de0f2ef254d8

        SHA512

        8b077ae6512e2edf8d957cfb807a24e0038560d997862f65ed5ccd6998ac58ab4c943c8af42d1b166edce8523223786136ba80f2e6c3221e4274406e3dae1120

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        994d500c71fe7e6342446aa18d0a5ec1

        SHA1

        6013b2e01688519bf2f0fa17695505fe53f6d575

        SHA256

        c3028e225446cddb631406d2482de0238372d1a21ff098bb7f9b11194656fbfd

        SHA512

        c9c8aad3518639da43d742b18ccad9af338c1586ff1d38f712df03d8839378a4bf51bca6b6070f3e8e3754a4cfd546233fc6f74f206b908e27ff422f1dcddd54

      • \??\Volume{62c5c1e3-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{96fe8499-2a6b-4a15-8c8d-97b18404d15c}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        3993cf36516049cbe4516ac8783fac5a

        SHA1

        78e1a4b1e9afedb1b4ffa4663bc5fba903c24788

        SHA256

        119530428ed126e2ae45e21f11d1b2831c366c057862151f08e190dfa4035836

        SHA512

        93c3fefe5a0113b42bc20c08495f4db8d489e2d29ecaa04a15c2796893e3b06f14e5210f6781a2a1fc51a0d0ceaf170d890ccc31604f20f40675f8e52612a567

      • memory/4448-94-0x0000000005990000-0x0000000005AF9000-memory.dmp

        Filesize

        1.4MB

      • memory/4448-188-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-88-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-86-0x0000000005990000-0x0000000005AF9000-memory.dmp

        Filesize

        1.4MB

      • memory/4448-92-0x0000000000400000-0x0000000001356000-memory.dmp

        Filesize

        15.3MB

      • memory/4448-93-0x0000000074300000-0x000000007529E000-memory.dmp

        Filesize

        15.6MB

      • memory/4448-74-0x0000000074300000-0x000000007529E000-memory.dmp

        Filesize

        15.6MB

      • memory/4448-70-0x0000000000400000-0x0000000001356000-memory.dmp

        Filesize

        15.3MB

      • memory/4448-101-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-99-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-115-0x0000000000400000-0x0000000001356000-memory.dmp

        Filesize

        15.3MB

      • memory/4448-57-0x00000000758F0000-0x000000007593B000-memory.dmp

        Filesize

        300KB

      • memory/4448-182-0x0000000000400000-0x0000000001356000-memory.dmp

        Filesize

        15.3MB

      • memory/4448-85-0x0000000005990000-0x0000000005AF9000-memory.dmp

        Filesize

        1.4MB

      • memory/4448-193-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-192-0x0000000007330000-0x0000000007489000-memory.dmp

        Filesize

        1.3MB

      • memory/4448-196-0x000000000A610000-0x000000000AB9B000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-199-0x0000000063280000-0x00000000634BE000-memory.dmp

        Filesize

        2.2MB

      • memory/4448-200-0x000000006E600000-0x000000006E69D000-memory.dmp

        Filesize

        628KB

      • memory/4448-201-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-202-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-203-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-205-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-204-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB

      • memory/4448-209-0x000000000ABA0000-0x000000000B120000-memory.dmp

        Filesize

        5.5MB